Professional Documents
Culture Documents
To cite this article: Huseyin Cavusoglu Ph.D. , Birendra Mishra Ph.D. & Srinivasan Raghunathan
Ph.D. (2004) The Effect of Internet Security Breach Announcements on Market Value: Capital
Market Reactions for Breached Firms and Internet Security Developers, International Journal of
Electronic Commerce, 9:1, 70-104
Article views: 38
Download by: [University of Nebraska, Lincoln] Date: 09 October 2015, At: 01:25
The Effect of Internet Security Breach
Announcements on Market Value:
Capital Market Reactions for Breached Firms
and Internet Security Developers
Huseyin Cavusoglu, Birendra Mishra, and Srinivasan Raghunathan
value of breached firms. The information-transfer effect of security breaches (i.e., their
effect on the market value of firms that develop security technology) was also studied.
The results show that announcing an Internet security breach is negatively associated
with the market value of the announcing firm. The breached firms in the sample lost, on
average, 2.1 percent of their market value within two days of the announcement—an
average loss in market capitalization of $1.65 billion per breach. Firm type, firm size, and
the year the breach occurred help explain the cross-sectional variations in abnormal returns
produced by security breaches. The effects of security breaches are not restricted to the
breached firms. The market value of security developers is positively associated with the
disclosure of security breaches by other firms. The security developers in the sample realized
an average abnormal return of 1.36 percent during the two-day period after the
announcement—an average gain of $1.06 billion in two days. The study suggests that the
cost of poor security is very high for investors.
KEY WORDS AND PHRASES: Capital markets, event study, information technology secu-
rity, information technology security management, Internet security, security breach an-
nouncements.
The number of companies that conduct business over the Internet is steadily
increasing, but the massive growth of e-business has not been an unmitigated
boon. The Internet provides great advantages to firms, facilitating the exchange
of vast amounts of information, goods, and services that can increase effi-
ciency and thus customer awareness and loyalty, but these advantages can
also turn into threats: Customers may be delighted to flip through dozens of
virtual sales racks and make immediate on-line purchases, but they certainly
do not want unauthorized parties to appropriate their credit card numbers
and other personal data, or interfere with their ability to access the Web site in
the first place. This problem is a very serious one for many companies. A re-
cent survey by CSI-FBI found that the Internet was the point of attack in 74
International Journal of Electronic Commerce / Fall 2004, Vol. 9, No. 1, pp. 69–104.
Copyright © 2004 M.E. Sharpe, Inc. All rights reserved.
1086-4415/2004 $9.50 + 0.00.
70 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
percent of hacking incidents in 2002, a rise from 38 percent in 1996 [61]. Ac-
cording to the Computer Emergency Response Team (CERT) Coordination
Center, the number of Internet attacks on business has almost doubled every
year since 1997 [16]. Not surprisingly, companies that do e-business are seek-
ing ways to exploit the interconnectivity of networks, encouraging and even
improving “open access,” but still maintain a security firewall.
Public awareness of security breaches increased dramatically when high-
profile Internet companies like Amazon, eBay, and Yahoo were hit by denial-
of-service (DOS) attacks in February 2000. Software developers are cognizant
of the need for secure products. In 2002, Microsoft took the unprecedented
step of ceasing development of new Windows operating system software for
an entire month and sending the company’s 7,000 systems programmers to a
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
special security training program [49]. In a memo addressing the incident, the
company’s president, Bill Gates, announced that security is now ”more im-
portant than any other part of our work. If we don’t do this, people simply
won’t be willing—or able—to take advantage of all the great work we do.
When we face a choice between adding features and resolving security issues,
we need to choose security. Our products should emphasize security right out
of the box” [15]. Gates’s memo did not estimate the cost of security breaches
to Microsoft, but it shows that a major software developer values features
related to security in its products.
Even as firms have come to recognize the importance of security, assessing
its economic value has proved to be challenging. Traditionally, organizations
have regarded security as a kind of insurance policy that mitigates conse-
quences rather than prevents them. According to Ron Knode, Computer Sci-
ences Corporation’s global director of managed security services, “While most
IS professionals recognize the benefits of protecting and securing data, the
business leadership in the organization still sees security as a ‘nice to have’
rather than ‘need to have.’ It is not until something goes wrong before percep-
tions change. The fact is, it costs far less to establish the right security mea-
sures at the outset than it does to recover from a breach in security” [25]. His
words proved true—three months later—when the February 2000 DOS attack
struck several firms.
The true cost of a security breach is manifold. Security lapses can lead to the
loss of consumer confidence and trust, over and above the lost business and
exposure to third-party liability. In a recent survey by Media Metrix, only 12.1
percent of U.S. companies with a Web presence cited direct financial loss as a
concern in security breaches, but more than 40 percent cited consumer trust
and confidence [58]. Although it may be impossible to directly quantify the
costs associated with the breaching of consumer trust and confidence, an indi-
rect estimate is possible on the basis of the capital market valuations of firms.
The present research has the following specific objectives:
1. To quantify the costs associated with IT security breaches using
market valuation data.
2. To explain the factors that affect the cross-sectional variations
related to breach costs.
3. To document the information-transfer effect of security breaches on
security developers’ market valuations.
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 71
not restrict the analysis to DOS attacks, but considers security breaches of all
types. This makes it possible to investigate the differential effects of DOS as
compared with other types of attack. Although the February 2000 incident is a
landmark in the IT security domain because of the wide scope and publicity of
the attack, the paper analyzes the impact of security breaches in 1996–2001
and does not isolate the February 2000 incident. Next, whereas Bharadwaj
and Keil study security breaches among several other types of IT failure (they
also consider DOS attacks only), the present paper focuses exclusively on se-
curity breaches. For the purposes of the study, a security breach is defined as a
malicious attempt to interfere with a company’s business and its information.
Thus, the study does not consider accidental events and glitches that may af-
fect the firm. In what is, perhaps, its most important departure from the afore-
mentioned two studies, the present analysis is not limited to one segment of
the market but also looks at certain repercussions of an attack beyond the
breached companies. The effects of security breaches on breached firms are
analyzed and so are the information-transfer effects produced by the breaches
on security technology firms. The present paper is the first study in the infor-
mation systems (IS) literature to investigate information-transfer effects.1
The research found that announcements of Internet security breaches were
negatively associated with the market value of the announcing firms. The
breached firms, on average, lost 2.1 percent of their market value within two
days of the announcement. This translated into a $1.65 billion average loss in
market capitalization per breach based on the mean market value of the firms
in the data set. The research also found that
1. Breach cost is higher for “pure play,” or Internet-only, firms than for
conventional firms.
2. Breach cost increased during the study period.
3. Security breaches are costlier for smaller firms than larger firms.
4. Breach cost is not significantly different across breach types.
The effects of security breaches were not restricted to the breached firms,
however. The market value of security technology firms was positively asso-
ciated with the disclosure of a security breach. The security firms in the sample
realized, on average, an abnormal return of 1.36 percent within two days after
the announcement. This produced, on average, a total gain for security firms
of $1.06 billion in a two-day period.
72 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
Transitory Long-term
In order to derive hypotheses, the study identified the different types of costs
associated with security breaches and their relationship to firm value under
the efficient market hypothesis.
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
The costs of security breaches can be broadly classified as transitory (or short-
term) costs, incurred only during the period in which the breach occurs, and
permanent (or long-term) costs, incurred over several periods.
The transitory costs of security breaches include lost business and decreased
productivity resulting from the unavailability of the breached resources; la-
bor and material costs required to detect, contain, repair, and reconstitute
breached resources; costs associated with evidence collection and prosecu-
tion of the attacker; costs related to providing information to customers and
the public; and other media-related costs [26].
Permanent, or long-term, costs have more far-reaching effects on the
breached firm’s future cash flow. These costs are related to the loss of custom-
ers who switch to competitors, inability to attract new customers due to per-
ceived poor security, loss of trust of customers and business partners, legal
liabilities arising from the breach, and the cost of attackers’ access to confi-
dential or proprietary information. Perceptions of increased business risk may
also translate into increased insurance costs for the firm and higher capital
costs in debt and equity markets.
The costs incurred as a result of breaches can be further classified as tan-
gible or intangible. It is possible to estimate the cost of lost sales, material and
labor, and insurance, but costs related to trust are difficult to calculate. None-
theless, these intangibles are extremely important in the measurement of the
overall cost of security for business. Table 1 blocks out the four types of costs
and the degree of uncertainty associated with dollar estimates of each type.
The magnitude of the four types of costs is likely to vary based on the breach
type and business type.
The study constructed a model for valuating firms based on the efficient mar-
ket hypothesis and investors’ belief revision. Consider a firm whose value at a
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 73
time period t is denoted by Vt. Assuming that the firm will liquidate at the
terminal period T, the value of the firm can be expressed as the discounted
value of expected future cash flows at time t conditioned on all the informa-
tion available to the market until time t.2 Thus,
G
T c i ηt
Vt = Et ∑ i ,
i=t ∏ (1+ rjt ) (1)
j=t
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
G
where ci ηt is the net cash flow in period i conditioned on all the information
available to the market until date t from the beginning of the firm’s existence.
G G
ηt = {ηt−1 , ηt }, with ηt the new information flow to the market during a time
from t – 1 to t. (Note that ηt itself can be multidimensional.) rjt represents the
term structure of the interest rate for the firm in a period j at some time t. Et
acts as the expectation operator at a time t (i.e., expectation with respect to
investor belief about cash flow distribution at time t).
The change in firm value between periods t and (t + 1) is
G G
T ci ηt+1 T c i ηt
∆V = Et+1 ∑ i − Et ∑ i . (2)
i=t+1 ∏ (1+ rjt+1 ) i=t ∏ (1+ rjt )
j=t+1 j=t
Given that the definition of period is arbitrary, if the length of the period is
shrunk such that ηt + 1 is simply the breach information during periods t and
t + 1, then ∆V represents the change in the firm’s value because of this firm-
specific event. Because the firm is part of a market, ∆V includes any change in
firm value that is related to market forces. Let ∆Vb be the change in value
produced by a firm-specific security breach event, and let ∆Vm be the change
in firm value because of a concomitant market event. Thus, for a breached
firm,
Several interesting observations are obtained from this model. First, both
the change in the breached firm’s value and the change in the market value
are observable during the event period. The change in firm value is derived
due to breach from these two observed values. Second, the change in the
breached firm’s value subsumes all types of breach costs mentioned above,
and the different types of costs cannot be distinguished. However, an indirect
approach can be used to get an estimate of these costs: The types of costs
likely to be associated with the breach event are specified ex ante for the firm
74 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
under consideration using specific information about the type of breach and
the attributes of the firm and rational arguments. For example, it is reasonable
to assume that most of the costs associated with a DOS attack will be tangible
short-term costs related to loss of business due to unavailability of the breached
information resources. However, in most cases, it may be nearly impossible to
separate the different types of breach costs. Third, in view of the fact that
investors change their beliefs based on all the information that is known to
date, the breach value will be correlated with the known characteristics of the
firm and breach type and any other information available to the investors.
Thus, in a cross-sectional analysis, the calculated breach cost can be regressed
against these attributes to better determine their effects on the breach cost. In
addition, it is important to note that because investors revise their beliefs based
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
on their most current information, the same information event can generate
different belief revisions for investors at different times.
Development of Hypotheses
In keeping with the discussion of breach costs and firm value under the effi-
cient market hypothesis, several testable propositions are derived in the dis-
cussion that follows.
As discussed above, a security breach is multifaceted and can have both tan-
gible and intangible costs. Whereas most tangible costs are immediate or short-
term, the intangible costs can have a long-term effect on the firm’s expected
future cash flows. Anecdotal evidence suggests that the impact of a security
breach on the breached firm’s value can be significant. For example, immedi-
ately following the February 2000 DOS attack, Yahoo, eBay, and Buy.com lost
15 percent, 24 percent, and 44 percent, respectively, of their market value [4].
The relationship between IT security and market valuations of firms doing
business on the Internet can be traced to the trust of customers who do busi-
ness with the firm through the Internet. Customer trust assumes more signifi-
cance in e-business because of concerns related to data privacy. A customer
may be unwilling to transact business with sites perceived to be insecure. A
security breach can irrevocably damage the trust and confidence necessary to
build a long-term relationship with the customer. In the Internet era, charac-
terized by much competition and little loyalty, dissatisfied customers can switch
to competitors that are just a click away. Thus, perceptions of lax security can
have a profound financial impact on a firm. Security problems may signal to
the market that the firm is not concerned about customer privacy or that its
internal security practices are poor, and this may lead investors to question
the firm’s long-term performance [32].
As described in the model given above, investors revise their expectations
based on new information in announcements. Investor expectations are re-
flected in the value of the firm. If investors view a security breach negatively,
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 75
believing that the transitory and long-term costs resulting from it will sub-
stantially reduce expected future cash flows [31], then one may expect a nega-
tive abnormal stock market return near the day of the announcement.
H1: A firm’s announcement of an Internet security breach is negatively
associated with its abnormal stock return.
it was unsafe to provide a credit card number over a computer [7]. A study by
the Angus Reid Group revealed that many Internet users have never shopped
on-line, because they fear their credit card information will be leaked or sto-
len [2]. Consumer fears about security and security breaches impose intan-
gible costs on firms, because they contribute to the loss of consumer confidence.
Conventional firms are relatively less affected than net firms by security
breaches on the Internet. Firms that use the Internet simply to provide infor-
mation to the public will incur little damage from DOS attacks on their Web
sites, and even those that conduct business over the Internet will not be com-
pletely shut down by such attacks. If, for example, a security problem shuts
down the Borders Web site, the company can continue to sell books through
its physical stores. This is not true for Amazon. If its Web site is down, there is
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
no other way for customers to transact business with the company. Besides,
the intangible costs in terms of customers’ and partners’ loss of trust in the
organization would probably be much more severe for net firms. Thus, even
if the dollar cost is the same in terms of time and other resources spent on
fixing the breach and getting the system up and running, intangible long-
term costs are likely to be far greater for Internet firms than for non-net firms.
Based on the above arguments, one may expect the impact of security breaches
to be higher for net firms than for conventional firms. Because the change in a
firm’s value due to a breach captures both the short- and long-term tangible
and intangible costs, one may posit a significant long-term intangible cost to
net firms, a cost that will be reflected in stock price returns. In other words,
cumulative negative abnormal returns are higher for Internet firms than for
non-net firms.
H2: The magnitude of abnormal negative returns for Internet security
breaches is larger for net firms than for conventional firms, ceteris paribus.
Firm size. It is well documented in the finance literature that the expected
return for small firms exceeds the expected return for large firms even after
accounting for beta, or market, risk [6, 33, 63]. Fama and French attribute this
discrepancy to possible distress risks in small firms [33]. With greater access
to capital markets, lower costs for capital, multiple sources of income, diversi-
fied market products, and brand-name recognition, large firms can absorb
negative economic and financial shocks more easily than small firms. Secu-
rity breaches can be viewed as negative economic shocks. Large firms are
likely to handle these shocks better than small firms.
In the strategic management literature, the resource-based theory of firms
is widely used to explain competitive advantage. This definition of a firm as a
broader set of resources that can be used to accomplish organizational goals
can be traced to the seminal work of Penrose [59].3 Resources are broadly de-
fined as tangible or intangible assets that are tied semipermanently to the firm
and may include brand names, skilled personnel, technological skills, pat-
ents, machinery, capital, and efficient procedures [14]. Large firms are likely
to have more of these resources than small firms: more capital to work with,
more slack resources to deploy in case of a security breach, such as backup
Web servers and IT staff, perhaps even more highly skilled IT personnel than
small firms. These differences can produce asymmetries in the impact of secu-
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 77
rity breaches. Both the distress risk issues cited by Fama and French and the
resource-based theory indicate that large firms may be better able to with-
stand the negative impacts of security breaches than small firms.
In addition, empirical studies in the IS domain have documented similar
relationships between firm size and abnormal returns. Bharadwaj and Keil
found an inverse relationship between firm size and (negative) abnormal stock
returns when they examined the effects of IT failures [10]. Hendricks and
Singhal reported similar results for supply-chain problems [39]. In a study of
the impact of IT investments, Im and colleagues observed that (positive) ab-
normal returns were negatively related to firm size [40].
H3: An abnormal (negative) stock market return due to an Internet
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
security breach is larger for smaller firms than for larger firms, ceteris
paribus.
2. The discussion of determinants now proceeds to event-specific factors.
Nature of attack (breach type). IT security breaches are associated with three
primary categories of attack: access attacks, modification attacks, and DOS
attacks [51]. Each type of attack compromises one or more of a company’s
security objectives: confidentiality of customer information, integrity of infor-
mation, and availability of applications and services.
In an access attack, the attacker attempts to gain unauthorized access to
information. Access attacks may occur through technical means that exploit
a vulnerability in the system, so that the attacker gains access to customer
information purely electronically. They may also be made through “social
engineering”—ploys or scams by which the attacker attempts to extract un-
authorized information from the customer (e.g., by posing as a customer rep-
resentative on the telephone and requesting credit card or other information).4
A modification attack is one in which the attacker attempts to make illegal
insertions or deletions of information. This type of attack compromises the
integrity of the information.
DOS attacks deny the use of resources, applications, or information to le-
gitimate users of the system.5 They are arguably the most critical security is-
sue on the Internet, particularly for e-commerce services.6 If the site is not
available, revenue is lost, resulting in a direct hit to the bottom line. Customer
dissatisfaction can grow quickly.
On the upside, DOS attacks have relatively brief durations and do not de-
stroy data. Although obviously disruptive, attacks on availability only affect
site accessibility, making them less damaging than other forms of attack that
destroy, manipulate, or expose programs and sensitive information on a wide
scale. DOS attacks do not expose firms to the potentially large third-party
liability associated with breaches of privacy and unauthorized leaks of cus-
tomer information. Thus, although tangible costs resulting from lost business
can be substantial after a DOS attack, the intangible costs are likely to be higher
with other types of attack. Because the overall cost of a breach includes both
types of cost, it is difficult to determine whether capital markets consider avail-
ability breaches more serious than other breach types. Thus, a directional re-
sult is not proposed in the next hypothesis.
78 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
H4: The magnitude of abnormal negative returns that result from Internet
security breaches will differ between availability and all other types of
attack, ceteris paribus.
3. Context-specific factors are the final body of determinants to be discussed.
Time. In the early days of the Internet, few security-related incidents oc-
curred, and firms and investors paid little heed to the possibilities of access,
integrity, or availability attacks. However, where once security was consid-
ered an unnecessary burden, in recent years, these issues have become a pri-
mary concern, as more firms experience security breaches. The pattern of
increase can easily be seen in the number of security incidents reported to
CERT. In 1996, there were only 2,573 reports of security-related incidents. This
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
number jumped to 21,756 in 2000, and to 52,658 in 2001 [16]. The popular
press has begun to publish more news about Internet security. A key word
search of the term “Internet security” in Lexis/Nexis revealed 97 articles in
1996, 696 articles in 2000, and 625 in 2001. Recent attacks on high-profile Web
sites like Amazon, eBay, Yahoo, and Etrade have contributed to heightened
awareness of Internet security.
Investors cannot have perfect insight into the exact costs of a particular
security breach, but as more is discovered about the cost of security breaches
in general, investors in due course may revise their beliefs about the costs.
The eventual change in reaction to similar events has been documented by
several IS researchers. Bharadwaj and Keil find that (negative) abnormal re-
turns due to IT-related project failures are positively associated with the pas-
sage of time [10]. Similarly, Subramani and Walden show that market reactions
to e-commerce announcements changed from positive to negative over time
[69]. In light of this, the research design controls for time. If a learning curve is
involved in investors’ gaining understanding of the implications of security
breaches, one would expect the response to security breaches to change over a
time interval [1].7 Time is used as a control variable to proxy for such belief
revision over time.8 Earlier researchers, such as Mikhail, Walther, and Willis
[52], used this variable to control for similar effects.
across industries in the supply chain and the characteristics of the supply chain,
such as relative dependence, level of vertical integration, and type of news
(i.e., good vs. bad) that affects the magnitude of information transfer.
The notion of information transfer in the present paper is similar to the one
used by Olsen and Dietrich and by Chang, Mishra, and Huang in that it posits
information transfer between firms that suffer from breaches and firms that
are potential suppliers of security products to breached firms [17, 56]. Follow-
ing both empirical and anecdotal evidence, it is expected that announcements
of security breaches will have a positive impact on the valuation of the stocks
of security firms.
H5: Announcements of Internet security breaches are positively associated
with abnormal stock market returns of Internet security firms.
Sample Selection
Sample Coding
Each announcement and all related firm characteristics were carefully exam-
ined to operationalize a classification scheme to test hypotheses 2 through 5.
Following the convention in other event studies, market value was used as a
surrogate for firm size [10, 40]. The natural logarithm of market value (in mil-
lion dollars) of the firm at the end of the year immediately preceding the event
date was used as a measure of firm size. Market value data were collected
from the Compustat database.
Internet.com’s Internet Stock ListTM and Morgan Stanley Dean Witter’s
Internet Companies List were used to code the firms in each announcement
as either conventional or net firms. These two lists are the most comprehen-
sive lists of Internet firms. They only include companies that are solely in
Internet-related business. The same lists were used in prior studies [30, 38,
71]. In the present study, a firm was classified as a net firm if it was listed on
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 81
both lists. If it did not appear in either list, it was coded as a conventional firm.
There were two firms, listed in one list but not the other. They were classified
as conventional firms because a detailed examination revealed that they gen-
erated a significant portion of their revenues from non-Internet channels. Of
the 66 events, 31 were coded as announcements by Internet firms, and the
remaining 35 as announcements by conventional firms.
To code the nature of the breach as either an availability breach or other
breach, each announcement was carefully examined to determine whether
the security breach resulted in the loss of availability of a service, application,
or information. Two of the authors independently categorized the security
breaches. The coders were in agreement in 96.96 percent of the cases. This
level of agreement indicates a very high level of intercoder reliability. Incon-
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
Sample Description
The list of Internet security firms was compiled from two sources:
INFOSYSSEC, the security portal for information system security, and Infor-
mation Security Magazine, the leading magazine for the security industry.
INFOSYSSEC provides a section about top security companies and their stock
quotes that lists more than 40 publicly traded security firms [42]. This list was
augmented with the list of security firms nominated for the 2002 Information
Security Excellence Awards by Information Security Magazine [41]. These awards
are given to companies that offer products and services recognized as leaders
in the information security field.
A total of 128 security firms was identified after the firms in these two
sources were combined. When the duplicates were removed, the list contained
82 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
Number of
Year security breaches
1996 2
1997 5
1998 6
1999 6
2000 21
2001 26
99 unique firms. The list was screened to identify the private firms and for-
eign security firms not traded in the United States—this process eliminated
43 firms from the list. After a careful investigation, any of the remaining firms
whit core business that was not Internet security were also removed. The busi-
ness description of each firm provided in Yahoo Finance was used for this
purpose. If security was not mentioned in the description, the firm was dropped
from the list. This process removed 16 firms from the list. The final list after all
these checks comprised 40 security firms traded in U.S. capital markets (see
Appendix B for details).
In the next step, a security firm sample was compiled for each event—that
is, for each announcement of a security breach. We included a security firm in
an event’s security firms sample only if it had been a publicly traded com-
pany for at least 160 days before the day of the event. The exact composition
of events’ security firm samples varied with time, because the number of se-
curity firms that qualified for inclusion (out of 40 firms) in the security firm
sample varied with time. The mean number of security firms for each event
was 31.12, the minimum was 17, the median was 36, and the maximum was
38. As in the case of the breached firms, these firms were then matched with
their return data in CRSP.
Statistical Methodology
Standard
Mean Median deviation Minimum Maximum
Ri ,t = αi + β i Rm ,t + εi ,t , (4)
where Ri,t is the return of stock i on day t; Rm,t represents the return on the
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
market portfolio on day t; αi and βi stand for the intercept and slope param-
eters, respectively, for firm i; and εi, t symbolizes a disturbance term for stock i
on day t, with the usual ordinary least squares (OLS) properties.
The NASDAQ composite index was chosen as the market index. It includes
more than 4,000 companies, more than most other stock market indices. Be-
cause it is broad-based, the composite is one of the most widely followed and
quoted market indices. Most of the firms in the sample were technology firms,
so the use of the NASDAQ composite index (characterized as a technology
index) as the market index was appropriate. Previous event studies on Internet
firms also used the NASDAQ as the market index (e.g., [62]).10
The market model was used to estimate the intercept and slope parameters
for each firm in the sample. The sizes selected for the estimation window and
the event window were based on previous event studies. The estimation pe-
riod ranges typically from 120 days to 200 days [10, 29, 40, 70]. The study used
an estimation window of 160 days. The estimation window started 160 days
before the announcement day and ended one day before the announcement
day. In event studies, the selection of the event window over which the effects
of an announcement are examined is crucial [50].11 A one-day event window
is usually preferred. In practice, the event window is often expanded to two
days, the day of announcement (t = 0) and the day after the announcement (t
= 1) [13, p. 151]. This is done to capture the price effects of announcements
that occur after the stock markets close on the announcement day. If the an-
nouncement is made before the markets close, any response to new informa-
tion in it will be reflected on the announcement day. However, if the
announcement is made after the markets close, the effects will be reflected in
the stock price on the day following the announcement. Some studies included
the period before the announcement day in the event window in order to
capture the possibility of information leakage to markets before the announce-
ment day [70]. Because security breaches are generally unanticipated, how-
ever, the event window in the present study did not incorporate any period
before the announcement. Consistent with the above arguments, a two-day
event window was used in the analysis. To the extent that the actual announce-
ment day preceded the day used in the sample, the tests were biased toward
accepting the null hypothesis of no abnormal returns in the event window.
The coefficient estimates, α{i, β{i, from regression of Equation 4 were used to
predict the expected return over the event window. Then the abnormal return
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 85
for firm i on day t of the event window was calculated, following McWilliams
and Siegel [50]
( )
ˆ i + βˆ i Rm,t .
ARi ,t = Ri ,t − α (5)
Abnormal returns (also called excess returns) are deviations of realized re-
turns from normal returns. They are unbiased estimates (in the return form) of
changes in the market value of the firm during the event period that are attrib-
uted to investors’ reactions to information contained in an announcement [29].
The standard errors are calculated as in Subramani and Walden [70]:
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
(Rm ,t − Rm )
2
1
var ( ARi ,t ) = si21+ + −1
160 2 (6)
∑ ( Rm ,t − Rm )
t=−160
where si2 is the residual return variance from the estimation of the market
model on the interval of 160 days before the event window, R|m is the mean
market return on the market index over the estimation window, and Rm,t is the
return on the market index on day t in the estimation window.
Assuming that abnormal returns are independent of time, for firm i, the
cumulative abnormal return (CAR) and the variance of the cumulative abnor-
mal return are the sum of the individual abnormal returns and variances over
the event window, respectively. Thus,
1
CARi = ∑ ARit (7)
t=0
and
1
var (CARi ) = ∑ var ( ARit ). (8)
t=0
1 N
CAR = ∑ CARi (9)
N i=1
along with
N
1
var (CAR ) = 2 ∑ var (CARi ). (10)
N i=1
86 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
Cumulative
Abnormal returns abnormal returns
t=0 t=1 (t = 0, t = 1)
A student’s t-test was used to test the alternative hypothesis that the mean
CAR over the event period significantly differed from zero:
CAR
t= t( a, df =N−1) .
var (CAR ) (11)
Results
Table 4 presents the abnormal returns for each day in the event window and
the cumulative abnormal returns over the event window resulting from the
announcements of Internet security breaches. The median and mean cumula-
tive abnormal return over the event period and the median and mean abnor-
mal return for each day in the event window were negative. On announcement
day (t = 0), an average of –0.86 percent abnormal returns was observed. The
stocks realized, on average, an abnormal return of –1.23 percent on the day
following the announcement (t = 1). This gave rise to a –2.09 percent cumula-
tive abnormal return over the event window. Compromised firms lost, on
average, around 2.1 percent of their market value within the two days sur-
rounding the events.12 This translated into a $1.65 billion average loss in mar-
ket capitalization per incident, based on the mean market value of the firms in
the data set.13
Table 5 presents the results to test H1. The mean abnormal returns are nega-
tive and statistically significant for each day in the event period. Over the
event window, the t-statistic for the mean cumulative abnormal return is al-
most 3, with a p-value of 0.00192, indicating that the mean cumulative abnor-
mal return is significantly different from zero. Thus, the null hypothesis of a
zero-mean cumulative abnormal return is rejected in favor of the alternative
hypothesis 1.
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
Frequency of
Event negative
window Mean t-value p-valuea returnsc z-valueb p-valuea
The results given above are based on the assumption that abnormal re-
turns and cumulative abnormal returns are normally distributed random vari-
ables. The Wilcoxon signed-rank test—a nonparametric test—was employed
to check the robustness of the results [53, p. 534]. As McWilliams and Siegel
pointed out, nonparametric tests are important to control for the effects of
outliers on the significance of results, because most event-study parametric
test statistics are sensitive to outliers [50]. The results in Table 5 indicate that
the signed-rank test statistic is negative (z = –1.8238) and significant (p = 0.0341),
confirming the results of the parametric test.
Abnormal Returns
A multiple linear regression model, given in Equation 12, was set up to study
the relationship between cumulative abnormal returns and characteristics of
events. The model regressed the cumulative abnormal returns on hypothesized
variables and control variables, namely, firm type, firm size, nature of attack,
and time. This made it possible to test hypotheses 2 through 4.
Standard
Variable Mean deviation Minimum Maximum (1) (2) (3) (4)
not supported by the data. The parameter estimate was negative but not sig-
nificant (t = –0.74; p = 0.4597). This implies that markets do not distinguish
between different types of security breaches. In other words, market partici-
pants apply a similar negative premium to all attacks regardless of type. H3,
which relates firm size to abnormal return, was strongly supported by the
data. The parameter estimate for the firm size was positive and highly signifi-
cant (t = 3.60; p = 0.0003), as expected. The result confirmed that smaller firms
lose more than larger firms in case of a security breach. The estimate of time
coefficient was negative and significant (t = –1.68; p = 0.0488), indicating that
investors reacted more harshly to the recent attacks.
The study assumed that the abnormal returns were uncorrelated in the cross-
section in order to analyze the effect of security breaches on announcing firms.
This was a reasonable assumption, because most of the announcements oc-
curred at different time intervals. The assumption made it possible to calcu-
late the variance of aggregated sample cumulative abnormal returns as the
sum of the variances of individual sample cumulative abnormal returns. The
assumption is not defensible, however, when the event windows overlap.
Because all the security firms experienced the same signal for possible infor-
mation transfer (i.e., an announcement of a security breach) on the same day,
the event windows overlapped perfectly. In this case, the assumption of no
covariance between the residuals (abnormal returns) of the security firms
would have been problematic [9]. Therefore, in this instance, it was undesir-
able to aggregate the estimated variances of the cumulative abnormal returns
of individual Internet security firms for a given security breach announce-
ment to estimate the variance of the mean cumulative abnormal return for
that event. Ignoring the contemporaneous correlation of residuals is even more
dangerous if the sample firms come from the same industry, as in this case,
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 91
1 N
CAR = ∑ CARi (13)
N i=1
( ) ( )
N
1 2
var CAR = ∑ CARi − CAR , (14)
N * ( N − 1) i=1
where CAR is the mean cumulative abnormal return of security firms for
security breach i, and CAR is the average of all CAR i s. Therefore, the test
statistic is
CAR
t= t( α ,df =N−1) .
(
var CAR ) (15)
Table 8 presents the abnormal returns for each day in the event window
and the cumulative abnormal returns over the event window resulting from
the announcements of Internet security breaches. Both the median and the
mean of the cumulative abnormal returns over the interval and the abnormal
returns for each day in the event window are positive. An average of 0.71
percent abnormal stock return was observed on the announcement day (t =
0). The stocks realized, on average, an abnormal return of 0.65 percent on the
day after the announcement (t = 1). This gave rise to a 1.1356 percent cumula-
tive abnormal return over the event window. In other words, each security
developer realized, on average, a 1.36 percent return above the return expected
by a market model. Thus, in the two-day period, a total average gain of $1.06
billion could be attributed to the information-transfer effects of security breach
announcements on the market values of security developers.
The information-transfer effects of security breach announcements are re-
ported in Table 9. The positive abnormal return is significant (t = 2.712). The
nonparametric test is also significant (z = 2.028). These results support the
hypothesis that security breach announcements affect the values of announc-
ing firms and also of Internet security developers. The market value of secu-
rity firms increased in anticipation of the expected future gains from such
incidents.
92 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
Cumulative abnormal
Abnormal returns returns
Frequency of
positive
Event window Mean t-value p-valuea returnsc z-valueb p-valuea
that beta was a better control for volatility than time. However, the main re-
sults were still significant (firm type was even more significant than before).
The attack type was still insignificant. Therefore, the results of the cross-sec-
tional analysis were not confounded by stock betas. Thus, the results were
robust against every sensitivity and robustness check that was conducted.
Implications
According to the CSI-FBI Computer Crime and Security Survey 2002, which
polled 503 respondents from organizations throughout the United States, 80
percent reported financial losses, but only 44 percent (223) were able to quan-
tify them. The total reported loss was $455,848,000, and the average estimated
loss was $2,044,161 per organization across all types of breaches. The highest
reported loss was for theft of proprietary information, reported by 41 organi-
zations, with an average of $4,166,512 per organization. The sabotage of data
networks cost an average of $351,953, and DOS attacks resulted in a $244,940
loss per organization. The reported losses included the firms’ estimates of
direct and tangible costs associated with security breaches only.
The results of the present study show that the announcement of an Internet
security breach is negatively associated with the market value of the announc-
ing firm. In the study, breached firms lost an average of 2.1 percent of their
market value within the two days surrounding the events, which is roughly a
$1.65 billion average loss in market capitalization per incident across breach
types. This figure is orders of magnitude above the average loss estimate re-
ported in the CSI-FBI survey. The huge difference in the estimates of firm
losses because of a security breach may be explained by the fact that firms in
the CSI-FBI survey estimated only direct costs, such as lost productivity or
sales, and expenditure on restoring the breached system, whereas the loss
estimated in the present event study may also include investors’ expectations
about the impact on future cash flows, which requires considerations of intan-
gible costs, such as the loss of consumer confidence. Investors may also antici-
pate that the firm will be breached again in the future. The estimates based on
the event study may be noisy because of the uncertainties. Even if the esti-
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 95
The study and research design had several limitations. Event-study method-
ology was used to estimate the cost of security breach events for firms. This
methodology relies on the assumptions that markets are efficient and inves-
tors are rational. Thus, the present research, like all other event studies, suffers
from the fact that real markets can deviate from such an ideal characterization.
The time period used for the study was characterized by high market valua-
tion and market volatility. This by itself does not invalidate the event-study
methodology, but it may increase the errors in the estimates of breach cost.
Although it is difficult to quantify these effects, the study tried to control them
with the time variable.16 The time variable is only weakly significant. How-
ever, to the extent that time does not capture the effects mentioned above, the
results should be interpreted with caution. An effort was made to eliminate all
known confounding events from the sample, but other, unknown factors that
may affect a firm’s market valuation during the event window may increase
the error in the estimates of breach cost. Another limitation is the focus on
publicly traded U.S. firms. This limits the generalization of the results to other
countries but increases the internal validity of the research design. Future re-
searchers may study the issue with samples from other nations.
Another significant limitation of the study relates to the categorization of
breach types. Breaches were classified as either availability attacks or attacks
of some other type. Clearly, it would be beneficial to classify the breaches that
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 97
belong to the second category more precisely. The reason for the primitive
classification was the unavailability of data in the announcements. In addi-
tion, a finer classification would require more sample data to have sufficient
statistical power. Further research can provide additional insights into the
impact of breach type on capital markets.
The results of the study summarized in this paper should be reassuring to
firms that have invested in information security. They should, as well, be a
source of encouragement supporting implementation for firms that doubt the
value of adopting sound security practices.
NOTES
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
14. The choice of the first announcement date as the reference point does not
affect the results, nor does the choice of year as the time unit.
15. We thank Yexiao Xu, professor of finance at the University of Texas at Dallas,
for suggesting these procedures. They do not assume that the cross-sectional error
terms are independent for each event date. We also did a simple t-test of the mean
that assumes that the cross-sectional error terms are independent for each event
date. The result was highly significant (t = 4.95; p < 0.0001).
16. Researchers like Mikhail, Walther, and Willis have used this variable to
control for similar effects [52].
REFERENCES
15. CBS News.com. Locking Windows. Associated Press, January 16, 2003.
Available at www.cbsnews.com/stories/2002/01/16/tech/
main324663.shtml.
16. CERT Coordination Center. CERT/CC Statistics 1988–2003. Carnegie-
Mellon University, Software Engineering Institute, January 22, 2004. Avail-
able at www.cert.org/stats/cert_stats.html.
17. Chang, H.; Mishra, B.; and Huang, C. Manager’s earnings forecast and
information transfer in supply chains. Working Paper, University of Califor-
nia at Riverside, 2003.
18. Chatterjee, D.; Richardson, V.J.; and Zmud, R.W. Examining the share-
holder wealth effects of announcements of newly created CIO positions.
MIS Quarterly, 25, 1 (2001), 43–70.
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
19. Chatterjee, S., and Price, B. Regression Analysis by Example. New York:
John Wiley, 1991.
20. Clinch, G.J., and Sinclair, N.A. Intra-industry information releases: A
recursive system approach. Journal of Accounting and Economics, 9 (1987), 89–
106.
21. Coenders, G., and Saez, M. Collinearity, heteroscedasticity and outlier
diagnostics in regression. In A. Ferligoj and A. Mrvar (ed.), New approaches
in applied statistics. Ljubljana: FDV, 2000, pp. 79–94.
22. Cook, R.D. Detection of influential observations in linear regression.
Technometrics, 19 (1977), 15–18.
23. Cooper, M.J.; Dimitrov, O.; and Rau, P.R. A rose.com by any other name.
Journal of Finance, 56, 6 (December 2001).
24. Costello, S. Study: Nearly 4000 DOS attacks occur per week. CNN.com/
IDG.net. Available at www.cnn.com/2001/TECH/internet/05/24/dos
.study.idg/.
25. CSC (Computer Sciences Corporation). CSC survey reveals inadequate
information security practices among companies worldwide (November 19,
2001). Available at www.csc.com/newsandevents/news/1584.shtml.
26. D’Amico, A.D. What does a computer security breach really cost? Secure
Decisions, a Division of Applied Visions, Northport, NY, September 7, 2000.
27. Dann, L.; Mayers, D.; and Raab, R. Trading rules, large blocks and the
speed of price adjustment. Journal of Financial Economics, 4 (1977), 3–22.
28. Davidson, W.; Worrell, D.; and Dutia, D. The stock market effects of CEO
succession in bankrupt firms. Journal of Management, 16 (1993), 517–533.
29. Dos Santos, B.L.; Peffers, D.C.; and Mauer D.C. The impact of informa-
tion technology investment announcements on the market value of the firm.
Information Systems Research, 4, 1 (1993), 1–23.
30. Ettredge, M., and Richardson, V.J. Assessing the risk in e-commerce. In
R.H. Sprague, Jr. (ed.), Proceedings of the Thirty-fifth Hawaii International
Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society
Press, 2002.
31. Fama, E. Efficient capital markets II. Journal of Finance, 46, 5 (1991), 1575–1617.
32. Fama, E.; Fisher, L.; Jensen, M.C.; and Roll, R. The adjustment of stock
prices to new information. International Economic Review, 10, 1 (1969), 1–21.
33. Fama, E., and French, K. The cross-section of expected stock returns.
Journal of Finance, 47, 2 (1992), 427–465.
100 CAVUSOGLU, MISHRA, AND RAGHUNATHAN
Hand and B. Lev (eds.), Intangible Assets: Values, Measures, and Risks. New
York: Oxford University Press, 2003.
39. Hendricks, K.B., and Singhal, V.K. The effect of supply chain glitches on
shareholder wealth. Paper presented at INFORMS 2001, Miami, November 2001.
40. Im, K.S.; Dow, K.E.; and Grover, V. Research report: A reexamination of
IT investment and the market value of the firm: An event-study methodol-
ogy. Information Systems Research, 12, 1 (March 2001), 103–117.
41. Information Security. Information Security 2002 Excellence Awards
Listing of Categories and Semi-Finalists. Available at www.infosecuritymag
.com/awards2002/listproducts.html.
42. INFOSYSSEC, The Security Portal for Information System Security
(http://infosyssec.com).
43. Koh, J., and Venkatraman, N. Joint venture formations and stock market
reactions: An assessment in information technology sector. Academy of
Management Journal, 34 (1991), 869–892.
44. Kornblum, J. AOL users conned for credit data. CNET News.com, May
20, 1997. Available at http://news.com.com/2100–1033_3–279948.html.
45. Lemos, R. A year later, DOS attacks still a major Web threat. CNET
News.com, February 7, 2001. Available at http://news.com.com/
A+year+later percent2C+DDoS+attacks+still+a+major+Web+threat/2009-
1001_3-252187.html.
46. MacKinlay, C.A. Event studies in economics and finance. Journal of
Economic Literature, 35 (1997), 13–39.
47. Mahdawan, R., and Prescott, J.E. Market value impact of joint venture:
The effect of industry information-processing load. Academy of Management
Journal, 38 (1995), 900–915.
48. Maiwald, E. Network Security: A Beginner’s Guide. Berkeley: Osborne/
McGraw-Hill, 2001.
49. Markoff, J. Stung by security flaws, Microsoft makes software safety a
top goal. New York Times, January 17, 2002, C1.
50. McWilliams, A., and Siegel, D. Event studies in management research:
Theoretical and empirical issues. Academy of Management Journal, 40, 3
(1997), 626–657.
51. Menzar, M.B.; Nigh, D.; and Kwok, C.C.Y. Effect of announcements of
withdrawal from South Africa on stockholder wealth. Academy of Manage-
ment Journal, 37, 6 (1994), 1633–1648.
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE 101
52. Mikhail, M.; Walther, B.; and Willis, R. Do security analysts improve
their performance with experience? Journal of Accounting Research, 35
(Suppl.) (1997), 131–157.
53. Miller, I., and Miller, M. John E. Freund’s Mathematical Statistics (6th ed.).
Upper Saddle River, NJ: Prentice Hall, 1999.
54. Mitchell, M., and Netter, J. Triggering the 1987 stock market crash:
Antitakeover provisions in the proposed house ways and means tax bill?
Journal of Financial Economics, 24 (1989), 37–68.
55. Nersey, C. Hacker scare again boosts security stocks. Available at
www.internetnews.com/bus-news/article.php/573961.
56. Olsen, C., and Dietrich, R. Vertical information transfers: The association
between retailers’ sales announcements and suppliers’ security returns.
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
ing for the value in internet stocks. Journal of Accounting Research, 38 (2000),
137–162.
72. Warner, B. Internet firm hacked out of business. Reuters, February 1,
2002. Available at http://techupdate.zdnet.com/techupdate/stories/main/
0,14179,2844881,00.html.
73. Wenderfelt, B. A resource based view of the firm. Strategic Management
Journal, 5 (1984), 171–180.
74. White, H. A heteroscedasticity-consistent covariance matrix estimator
and a direct test for heteroscedasticity. Econometrica, 48, 4 (1980), 817–838.
75. Zhu, K., and Kraemer, K.L. E-commerce metrics for net-enhanced
organizations: Assessing the value of e-commerce to firm performance in
the manufacturing sector. Information Systems Research, 13, 3 (2002), 275–295.
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
This is a list of security firms traded in the United States. The list was com-
piled from two sources: INFOSYSSEC, the security portal for information sys-
tem security, and Information Security Magazine, the leading magazine of the
security industry. A careful investigation of the firms on the list found that IT
security was not the core business for some of them. The business description
of each firm was checked in Yahoo Finance. If security was not mentioned
Downloaded by [University of Nebraska, Lincoln] at 01:25 09 October 2015
there, the firm was dropped from the list. Sixteen firms were dropped because
their core businesses did not include security. An asterisk indicates that the
firm was dropped from the list.
ID Company ID Company
pers forthcoming in Communications of the ACM and Decision Analysis. His major re-
search interests are in the areas of information economics, assessment of the value of
IT security, and IT security management. He is a member of AIS and INFORMS.